搜索结果: 1-15 共查到“军队指挥学 key establishment”相关记录24条 . 查询时间(0.066 秒)
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
An Isogeny-Based Password-Authenticated Key Establishment Protocol
isogeny-based cryptography password-authenticated key establishment
2018/11/13
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence...
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Post-quantum cryptography isogeny-based cryptography authenticated key establishment
2018/3/26
We propose a security model for authenticated key establishment in the quantum setting. Our model is the first for authenticated key establishment that allows for quantum superpositions of queries. Th...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Analysis of authentication and key establishment in inter-generational mobile telephony
wireless network protocol authentication protocol
2014/3/13
Second (GSM), third (UMTS), and fourth-generation (LTE) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. Although the standards address roaming b...
Cryptanalysis of three matrix-based key establishment protocols
a matrix-based key transport protocol Baumslag Camps
2011/2/23
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due t...
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due t...
A Reflection on the Security of Two-Party Key Establishment Protocols
key establishment key authentication entity authentication
2010/4/7
Two-party key establishment has been a very fruitful research area
in cryptography, with many security models and numerous protocols proposed.
In this paper, we take another look at the YAK protocol...
On the Connection between Signcryption and One-pass Key Establishment
One Pass Key establishment Signcryption Signcryption KEM
2009/9/11
Key establishment between two parties that uses only one message transmission is referred
to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient constructions,
eve...
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
sensor network key establishment secure message transmission
2009/9/2
In this paper, we propose a security model to capture active attacks against multi-path key establishment (MPKE) in sensor networks. Our model strengthens previous models to capture more attacks and a...
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
Group Key Exchange Compilers Tree Based Group Key Exchange Circular topology
2009/6/12
This work presents the first scalable, efficient and generic compilers to construct group key
exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose
three diffe...
Parsing ambiguities in authentication and key establishment protocols
Parsing ambiguities key establishment protocols parsing ambiguity attacks
2009/6/9
A new class of attacks against authentication and authenticated key estab-
lishment protocols is described, which we call parsing ambiguity attacks. If
appropriate precautions are not deployed, thes...
New attacks on ISO key establishment protocols
attacks ISO key establishment protocols key establishment mechanism
2009/6/5
Cheng and Comley demonstrated type °aw attacks against the key establishment mechanism
12 standardized in ISO/IEC 11770-2:1996. They also proposed enhancements to ¯x the security
°aws in the me...
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Attacks ISO/IEC 11770-2 Key Establishment Protocol
2009/3/27
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are proposed.